General

  • Target

    884d0260cf894f82c7a49dffa1f1de55.exe

  • Size

    55KB

  • Sample

    241208-cszzrsxlbv

  • MD5

    884d0260cf894f82c7a49dffa1f1de55

  • SHA1

    58a17ad2995b57b43a3da627691340d418034d89

  • SHA256

    ec617ae71fd8463ac6651b8289a06de9a8f184ce6c94f1b5ef2a482dbcfeb9e0

  • SHA512

    c7a64e7d12809fa017fb44c70f3e92978e3cf629aaa088e960ab92e3cd659a5175a5337fdae5d08b6e8d6b1dec123e987e041a554da89746267e1354b3e0258f

  • SSDEEP

    1536:kRksDnHNwZ8Cam8LDdwsNMD2XExI3pmLm:rsDn6SKiDdwsNMD2XExI3pm

Malware Config

Extracted

Family

njrat

Version

<- NjRAT 0.7d Horror Edition ->

Botnet

fucked by kev

C2

japanese-cross.gl.at.ply.gg:16828

Mutex

ba504e39d49d09ba3f0b71067d651692

Attributes
  • reg_key

    ba504e39d49d09ba3f0b71067d651692

  • splitter

    Y262SUCZ4UJJ

Targets

    • Target

      884d0260cf894f82c7a49dffa1f1de55.exe

    • Size

      55KB

    • MD5

      884d0260cf894f82c7a49dffa1f1de55

    • SHA1

      58a17ad2995b57b43a3da627691340d418034d89

    • SHA256

      ec617ae71fd8463ac6651b8289a06de9a8f184ce6c94f1b5ef2a482dbcfeb9e0

    • SHA512

      c7a64e7d12809fa017fb44c70f3e92978e3cf629aaa088e960ab92e3cd659a5175a5337fdae5d08b6e8d6b1dec123e987e041a554da89746267e1354b3e0258f

    • SSDEEP

      1536:kRksDnHNwZ8Cam8LDdwsNMD2XExI3pmLm:rsDn6SKiDdwsNMD2XExI3pm

    • Njrat family

    • njRAT/Bladabindi

      Widely used RAT written in .NET.

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks